Description
A vulnerability was found in PHPGurukul Online Shopping Portal Project 2.1. The impacted element is an unknown function of the file /admin/update-image1.php of the component Parameter Handler. The manipulation of the argument filename results in sql injection. The attack may be performed from remote. The exploit has been made public and could be used.
Published: 2026-04-06
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises in the /admin/update-image1.php file of the PHPGurukul Online Shopping Portal Project. An attacker can manipulate the filename parameter to inject arbitrary SQL code. This flaw is a classic SQL injection (CWE-74 and CWE-89) that could allow an attacker to read or modify database records, potentially compromising confidentiality, integrity, or availability of the application’s data.

Affected Systems

The affected product is PHPGurukul Online Shopping Portal Project version 2.1. The issue resides in the Parameter Handler component of the admin interface. No other versions are explicitly listed as vulnerable.

Risk and Exploitability

The CVSS score of 5.3 classifies this vulnerability as medium risk, and the lack of EPSS data means the exact likelihood of exploitation is uncertain. The description indicates that the attack can be performed remotely, likely by sending a crafted request to the filename argument of /admin/update-image1.php. While the exploit is publicly available, its effective use requires access to the admin endpoint, which could be privileged or protected by authentication. The overall risk is moderate, with potential for significant data compromise if the vulnerability is exploited.

Generated by OpenCVE AI on April 6, 2026 at 12:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply an available patch or upgrade to the latest version of the PHPGurukul Online Shopping Portal Project that resolves the SQL injection issue.
  • Restrict access to /admin/update-image1.php to authorized administrators only, using authentication or firewall rules.
  • Validate and sanitize the filename parameter server-side to prevent injection.
  • Monitor logs for suspicious activity on the /admin/update-image1.php endpoint.
  • Limit database permissions for the application to reduce the impact of any injection.

Generated by OpenCVE AI on April 6, 2026 at 12:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 06 Apr 2026 15:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 06 Apr 2026 10:30:00 +0000

Type Values Removed Values Added
Description A vulnerability was found in PHPGurukul Online Shopping Portal Project 2.1. The impacted element is an unknown function of the file /admin/update-image1.php of the component Parameter Handler. The manipulation of the argument filename results in sql injection. The attack may be performed from remote. The exploit has been made public and could be used.
Title PHPGurukul Online Shopping Portal Project Parameter update-image1.php sql injection
First Time appeared Phpgurukul
Phpgurukul online Shopping Portal Project
Weaknesses CWE-74
CWE-89
CPEs cpe:2.3:a:phpgurukul:online_shopping_portal_project:*:*:*:*:*:*:*:*
Vendors & Products Phpgurukul
Phpgurukul online Shopping Portal Project
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Phpgurukul Online Shopping Portal Project
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-04-06T14:49:24.340Z

Reserved: 2026-04-05T20:31:06.845Z

Link: CVE-2026-5641

cve-icon Vulnrichment

Updated: 2026-04-06T14:33:47.247Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-06T10:16:02.297

Modified: 2026-04-07T13:20:35.010

Link: CVE-2026-5641

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-06T21:33:01Z

Weaknesses